In AWS EC2, I start a Classical Load Balancer in front of EC2 instance (security group of EC2 instance is launch-wizard-3). i want to change the inbound rule of Security Group of EC2 instance . A security group for Classical Load Balancer (it's name is my-first-load-balancer-sg) was also started. when i am changing source of an inbound rule of launch-wizard-3 to the my-first-load-balancer-sg, following error is prompted. I tried many times to solve it, but i couldn't.
the error- You may not specify a referenced group id for an existing IPv4 CIDR rule.
the inbound rule as follows
(type-HTTP, protocol-TCP, port rang-80, Source type- Custom, Source- my-first-load-balancer-sg(what i want to place) )
Please help me~! Thanks!
To reference a security group in another AWS account, include the account number in Source or Destination field; for example, 123456789012/sg-1a2b3c4d . You cannot reference the security group of a peer VPC that's in a different Region. Instead, use the CIDR block of the peer VPC.
10.10, and another security group that allows access to port 22 from everyone, everyone will have access to port 22 on the instance. Show activity on this post. When you specify a security group as the source or destination for a rule, the rule affects all instances associated with the security group.
Go to the security group of the EC2 instance and edit the inbound rule allow 0.0. 0.0/0 for ICMP. It will work.
The following table describes the inbound rule for a security group that enables associated instances to communicate with each other. The rule allows all types of traffic. The ID of the security group. The ping command is a type of ICMP traffic. To ping your instance, you must add the following inbound ICMP rule.
For example, an instance that's configured as a web server needs security group rules that allow inbound HTTP and HTTPS access. Likewise, a database instance needs rules that allow access for the type of database, such as access over port 3306 for MySQL.
For the source IP, specify one of the following: The default port to access an Amazon Redshift cluster database. You can optionally restrict outbound traffic from your database servers. For example, you might want to allow access to the internet for software updates, but restrict all other kinds of traffic.
I solved this from deleting the existing rule and creating a new rule
AWS Database security group configuration
Simply delete and Add a new rule with the options you require.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With